Fake MAS Windows activation domain used to spread PowerShell malware
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是一个恶意域名模仿微软激活脚本工具(MAS),用来传播PowerShell脚本,感染Windows系统,植入“Cosmali Loader”恶意软件。用户在激活Windows时误输域名导致感染。恶意软件的面板不安全,研究人员发现该恶意软件用于分发挖矿工具和远程访问木马。建议用户检查任务管理器中的异常PowerShell进程,并重新安装Windows以清除感染。 接下来,我需要把这些信息浓缩到100字以内。重点包括:恶意域名模仿MAS、传播PowerShell脚本、植入Cosmali Loader、用户误输域名导致感染、恶意软件功能、建议检查进程和重装系统。 可能的结构是:恶意域名模仿MAS工具,传播PowerShell脚本植入Cosmali Loader。用户因输入错误激活导致感染。该恶意软件用于分发挖矿工具和远程访问木马。建议检查异常进程并重装系统。 现在检查字数是否在限制内,并确保信息准确无遗漏。 </think> 一个恶意域名模仿微软激活脚本工具(MAS),通过PowerShell脚本传播"Cosmali Loader"恶意软件感染Windows系统。用户因输入错误激活链接导致感染。该恶意软件用于分发挖矿工具和远程访问木马。建议检查任务管理器中的异常PowerShell进程,并重新安装Windows以清除感染。 2025-12-24 22:46:11 Author: www.bleepingcomputer.com(查看原文) 阅读量:1 收藏

Fake MAS Windows activation domain used to spread PowerShell malware

A typosquatted domain impersonating the Microsoft Activation Scripts (MAS) tool was used to distribute malicious PowerShell scripts that infect Windows systems with the 'Cosmali Loader'.

BleepingComputer has found that multiple MAS users began reporting on Reddit [1, 2] yesterday that they received pop-up warnings on their systems about a Cosmali Loader infection.

You have been infected by a malware called 'cosmali loader' because you mistyped 'get.activated.win' as 'get.activate[.]win' when activating Windows in PowerShell.

Wiz

The malware's panel is insecure and everyone viewing it has access to your computer.

Reinstall Windows and don't make the same mistake next time.

For proof that your computer is infected, check Task Manager and look for weird PowerShell processes.

Based on the reports, attackers have set up a look-alike domain, "get.activate[.]win," which closely resembles the legitimate one listed in the official MAS activation instructions, "get.activated.win."

Given that the difference between the two is a single character ("d"), the attackers bet on users mistyping the domain.

Security researcher RussianPanda discovered that the notifications are related to the open source Cosmali Loader malware, and could be related to similar pop-up notifications spotted by GDATA malware analyst Karsten Hahn.

RussianPanda told BleepingComputer that Cosmali Loader delivered cryptomining utilities and the XWorm remote access trojan (RAT).

Although it is unclear who pushed the warning messages to users, it is likely that a well-intended researcher gained access to the malware control panel and used it to inform users of the compromise.

MAS is an open-source collection of PowerShell scripts that automate the activation of Microsoft Windows and Microsoft Office using HWID activation, KMS emulation, and various bypasses (Ohook, TSforge).

The project is hosted on GitHub and is openly maintained. However, Microsoft sees it as a piracy tool that activates products without a purchased license using unauthorized methods that circumvent its licensing system.

The maintainers of the project also warned users of the campaign and urged them to check the commands they type before executing them.

Tweet

Users are recommended to avoid executing remote code if they don't fully understand what it does, always test in a sandbox, and avoid retyping commands to minimize the risk of fetching dangerous payloads from typosquatted domains.

Unofficial Windows activators have been repeatedly used for malware delivery, so users need to be aware of the risks and exercise caution when using such tools.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/fake-mas-windows-activation-domain-used-to-spread-powershell-malware/
如有侵权请联系:admin#unsafe.sh